A vulnerability was found in mbed TLS 3.5.x. It has been classified as problematic. Affected is an unknown function of the component ClientHello Handler. The manipulation leads to inadequate encryption strength.
This vulnerability is traded as CVE-2024-28836. It is possible to launch the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as problematic, has been found in Huawei HarmonyOS and EMUI. This issue affects some unknown processing of the component Lock Screen Module. The manipulation leads to permission issues.
The identification of this vulnerability is CVE-2023-52717. The attack can only be initiated within the local network. There is no exploit available.
A vulnerability was found in WPMU Forminator Plugin up to 1.28.x on WordPress. It has been declared as problematic. Affected by this vulnerability is an unknown functionality. The manipulation leads to unrestricted upload.
This vulnerability is known as CVE-2024-28890. The attack can be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as critical has been found in Aten PE6208 2.3.228/2.4.232. Affected is an unknown function of the component HTTP GET Request Handler. The manipulation leads to improper access controls.
This vulnerability is traded as CVE-2023-43843. It is possible to launch the attack remotely. There is no exploit available.
A vulnerability classified as problematic was found in LB-LINK BL-W1210M 2.0. This vulnerability affects unknown code. The manipulation leads to improper restriction of excessive authentication attempts.
This vulnerability was named CVE-2024-33373. The attack can be initiated remotely. There is no exploit available.
A vulnerability was found in DESIGNA Abacus up to 18. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the component QR Code Handler. The manipulation leads to enforcement of behavioral workflow.
This vulnerability is known as CVE-2024-31802. The attack needs to be approached within the local network. There is no exploit available.
A vulnerability was found in Linux Kernel up to 6.11.5. It has been declared as critical. Affected by this vulnerability is the function put of the component drm. The manipulation leads to stack-based buffer overflow.
This vulnerability is known as CVE-2024-50144. The attack needs to be approached within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as problematic, has been found in Linux Kernel up to 6.0/6.1/6.1.114/6.6.58/6.11.5. This issue affects the function mlx5_cmd_trigger_completions. The manipulation leads to improper initialization.
The identification of this vulnerability is CVE-2024-50147. The attack needs to be initiated within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as problematic, has been found in Advanced Custom Fields Plugin and Secure Custom Fields Plugin on WordPress. Affected by this issue is some unknown functionality. The manipulation leads to cross site scripting.
This vulnerability is handled as CVE-2024-49593. The attack may be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as problematic was found in Wilson Windowware WebBatch 2007c. Affected by this vulnerability is an unknown functionality of the file webbatch.exe. The manipulation leads to cross site scripting.
This vulnerability is known as CVE-2007-5010. The attack can be launched remotely. Furthermore, there is an exploit available.